Logo

The Laws of Cryptography with Java Code

Small book cover: The Laws of Cryptography with Java Code

The Laws of Cryptography with Java Code
by

Publisher: Univ. of Texas San Antonio
Number of pages: 334

Description:
In this book the author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible and of interest to many others.

Download or read it online for free here:
Download link
(1.1MB, PDF)

Similar books

Book cover: A brief introduction of quantum cryptography for engineersA brief introduction of quantum cryptography for engineers
by - arXiv
We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.
(13761 views)
Book cover: Fundamentals of Cryptology: A Professional Reference and Interactive TutorialFundamentals of Cryptology: A Professional Reference and Interactive Tutorial
by - Springer
This is a thoroughly written wonderful book on cryptography! This excellent book is warmly recommended for mathematicians, computer scientists, for professors and students, and, as a reference book, for researchers in the area of cryptography.
(15239 views)
Book cover: Introduction to Modern CryptographyIntroduction to Modern Cryptography
by - University of California at Davis
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
(16213 views)
Book cover: Hacking Secret Ciphers with PythonHacking Secret Ciphers with Python
by
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, etc.
(22395 views)